SYLOGENT DEDICATED HOSTING

Size: px
Start display at page:

Download "SYLOGENT DEDICATED HOSTING"

Transcription

1 HOSTING & PROCESS

2 SYLOGENT DEDICATED HOSTING VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM HYPERVISOR HYPERVISOR HYPERVISOR DB1 active DB2 passive Clustered hypervisors that host dedicated VMs integrated with clustered Active / Passive databases utilizing a scaleable SAN. SAN Sylogent utilizes Rackspace Critical Care Support which guarantees 1 hour hardware replacement. Sylogent performs periodic failover tests. Patch management and virus protection is coordinated with Sylogent IT and Rackspace. The work is typically completed during preset scheduled maintenance periods.

3 SYLOGENT DEDICATED HOSTING PROD TEST TRAIN VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM HYPERVISOR HYPERVISOR HYPERVISOR DB1 active DB2 passive Each client typically receives three dedicated instances of the system - Production. Testing. Training. SAN Rackspace performs nightly differential backups with weekly offsite full backups utilizing 4 week overwrite rotation.

4 Validation Plan ( optional ) Should be established and agreed between CLIENT and the SYLOGENT to meet regulatory requirements and expectations Sylogent will provide CLIENT a 21 CFR Part 11 Compliance Assessment document along with a Validation Certificate. As an option, CLIENT is welcome to validate the system if they prefer. Role Assignment Log Should be established and agreed between CLIENT and the SYLOGENT to meet regulatory requirements and expectations The Role Assignment is managed within the application by either Sylogent support team and or CLIENT. Additionally, CLIENT can provide Sylogent an Excel file with CLIENT users and their assigned roles that can be input into the system by either party. The system includes a User Report that can be generated at any time to verify Role Assignments. Risk Assessment for Application System Provider needs to be aware of identified risk and mitigating measures Sylogent performs a risk assessment for each application prior to development and will provide CLIENT with its AA Risk Assessment Procedure. Specific design risks are also reviewed and addressed in validation document: This document is considered proprietary and may be viewed on-site. User Requirements Should be established on the system level and agreed between CLIENT and the SYLOGENT to meet regulatory requirements and expectations Sylogent will provide CLIENT with document [ X ] Product Requirements. CLIENT may map their user requirements to the Functional Requirements within this document, if desired. Any additional agreed upon requirements will be processed per Sylogent s FF Change Control of Computerized Systems Procedure which Sylogent will make available to CLIENT. Data Migration Plan Must execute relevant parts of the migration plan as indicated by CLIENT Sylogent will migrate all CLIENT date from existing systems or documents as needed. Additional migration efforts need to be defined by CLIENT.

5 System Design Specifications Should be established on the system level and agreed between CLIENT and the SYLOGENT to meet regulatory requirements and expectations Sylogent Design Specifications for all applications are considered proprietary. An on-site visit is required to view applicable design specifications. Configuration Specification Should be established on the system level and agreed between CLIENT and the SYLOGENT to meet regulatory requirements and expectations, provider should maintain a current system configuration specification Sylogent will provide CLIENT with System Configuration Document. Upon completion, Sylogent will configure the application with settings defined in the configuration document. Any changes to the application configuration, post launch, will be managed through the FF Change Control of Computerized Systems Procedure. Traceability Matrix Supplier should be able to demonstrate traceability of requirements and specifications to testing. Will be verified during supplier assessment. Per Sylogent s EE Software Validation Documentation procedure, Sylogent traces from Requirement to Design Specification to Test Case. Although full documents in some cases can only be viewed on-site, Sylogent will provide CLIENT with the matrix portion of each document. Technical Installation Should exist for all CLIENT installations (GxP or otherwise) Sylogent performs qualification on all application instances. Sylogent will provide CLIENT with its EE Installation Qualification Documentation Procedure. This includes the TEC Installation Protocol document that addresses technical installation. Installation Qualification Should exist for all CLIENT installations (GxP or otherwise) Sylogent performs qualification on all application instances. Sylogent will provide CLIENT with its EE Installation Qualification Documentation Procedure. The installation qualification documentation includes the TEC Installation Report which will be provided to CLIENT post-launch.

6 Software Design Specification. Software Development Plan. Software Development Testing. The supplier must follow an acceptable software development process. Sylogent follows its EE Software Development Life Cycle Procedure in conjunction with its EE Software Validation Documentation Procedure. Sylogent will provide both procedures to CLIENT. Validation documentation consists of the following documents: OQ Plan/Report o TEC Product Requirements o TEC Project Plan o TEC Design Specifications (on-site only) o TEC Technical Specifications (on-site only) o TEC Code Review Report (on-site only) o TEC Build Notes (on-site only) o TEC SQA Testing Protocol (partial) o TEC SQA Testing Report (partial) o TEC Release Notes o TEC Validation Summary Report Should exist for all CLIENT installations (GxP or otherwise) Sylogent will execute a set of test cases to verify application is configured to CLIENT Configuration Document and application is functioning as expected. Sylogent will deliver to CLIENT a report of the test case results. PQ Plan/Report Should be established on the system level and agreed between CLIENT and the SYLOGENT to meet regulatory requirements and expectations Sylogent will execute a set of test cases to verify system is performing as expected. Sylogent will deliver to CLIENT a report of the system performance results. Change Control Process During the supplier assessment, CLIENT will verify a change control process that meets regulatory expectations is in place and followed. Sylogent will provide CLIENT with its FF Change Control of Computerized Systems Procedure.

7 Periodic Review Process During the supplier assessment CLIENT will verify a periodic review process on the system level that meets regulatory expectations is in place and followed. Sylogent will provide CLIENT with its II Product Review and Improvement Procedure. Incident Management Process During the supplier assessment CLIENT will verify an incident management process on the system level that meets regulatory expectations is in place and followed. Sylogent will provide CLIENT with its II Incident Handling Procedure. Service Level Agreement An SLA should be established between CLIENT and the supplier Sylogent will work with CLIENT to establish an appropriate SLA. SLA generally includes the following: Scope of Work and Services, Deliverables, Sylogent and Hosting Responsibilities, Customer Responsibilities, Key Contact Information, Service Requests and Notifications, Technical Support, Maintenance, Upgrades, Response Times, Standard Training Services, Exclusions, Supported Versions, Escrow. A sample of a standard SLA is attached. Training Process The supplier should have a formal training program in place and this will be verified as part of the supplier assessment. The training program should include relevant GxP topics Staff training is conducted annually and records are available on-site. Sylogent will provide CLIENT with its CC Training Procedure. Security Administration The provider must have a thorough provisioning/de-provisioning process in place and be amicable to CLIENT auditing the process routinely. Sylogent will provide CLIENT with its Sylogent s DD Master Security Procedure.

8 Retirement The supplier should have a process for system retirement as part of the life cycle approach and will be verified as part of the supplier assessment, including elimination of "CLIENT data" residing on their systems. Sylogent will provide CLIENT with its EE Application and Instance Retirement Procedure. Data Center Qualification The supplier must have a properly qualified data center; the status of the qualification must be periodically reviewed. This will be verified as part of the supplier assessment. Sylogent will provide CLIENT with its AA SYLOGENT Qualification Procedure. SYLOGENT Evaluation and SYLOGENT Assessment forms can viewed on-site, if desired. In addition, the ISO and SSAE16 Certifications (SOC reports) will be provided. Data Center Security The supplier must have data center security processes that ensure only authorized individuals have access to the data center. CLIENT will verify the existence of procedure governing these activities during the supplier assessment Sylogent will provide CLIENT with Sylogent s DD Master Security Procedure and the following documents in support of the Rackspace data center: ISO and SSAE16 Certifications (SOC Reports). Disaster Recovery CLIENT must verify a disaster recovery that meets CLIENT s requirements is in place and that it is periodically tested. This will be done as part of the supplier assessment. Sylogent will provide CLIENT with its GG Disaster Recovery and GG Business Continuity Procedures. Back Up - Recovery The supplier should have a documented process for BU&R and have evidence of successful testing. This will be verified during the supplier assessment. Sylogent will provide CLIENT with its FF Rackspace Data Hosting Procedure which addresses back up of client data. Sylogent will also provide CLIENT with its GG Administration Systems Backup and Recovery Procedure (Sylogent data only and does not house client data). Data Transfer Appropriate processes for data transfer from the provider site to a CLIENT site, or for transfer from system to system within the provider site, must be established and agreed (e.g. encryption etc.). Sylogent will provide CLIENT with its DD Data Interchange Procedure.

9 SYLOGENT 411 South State Street Newtown, PA Jack Yeager - CEO jack.yeager@sylogent.com x26 Dawn Albano - QC dawn.albano@sylogent.com x25

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data

More information

Pharma CloudAdoption. and Qualification Trends

Pharma CloudAdoption. and Qualification Trends Pharma CloudAdoption and Qualification Trends OurCloudExperience Numerous implementations of EDMS systems with external hosting for smaller life science clients Development of qualification strategy for

More information

Validating Cloud. June 2012 Merry Danley

Validating Cloud. June 2012 Merry Danley Validating Cloud June 2012 Merry Danley Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience

More information

Cloud Vendor Evaluation

Cloud Vendor Evaluation Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business

More information

StratusLIVE for Fundraisers Cloud Operations

StratusLIVE for Fundraisers Cloud Operations 6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace

More information

Testing Automated Manufacturing Processes

Testing Automated Manufacturing Processes Testing Automated Manufacturing Processes (PLC based architecture) 1 ❶ Introduction. ❷ Regulations. ❸ CSV Automated Manufacturing Systems. ❹ PLCs Validation Methodology / Approach. ❺ Testing. ❻ Controls

More information

CONTENTS. List of Tables List of Figures

CONTENTS. List of Tables List of Figures Prelims 13/3/06 9:11 pm Page iii CONTENTS List of Tables List of Figures ix xi 1 Introduction 1 1.1 The Need for Guidance on ERP System Validation 1 1.2 The Need to Validate ERP Systems 3 1.3 The ERP Implementation

More information

GAMP 4 to GAMP 5 Summary

GAMP 4 to GAMP 5 Summary GAMP 4 to GAMP 5 Summary Introduction This document provides summary information on the GAMP 5 Guide and provides a mapping to the previous version, GAMP 4. It specifically provides: 1. Summary of Need

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Services Providers. Ivan Soto

Services Providers. Ivan Soto SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed

More information

Introduction to Cloud Computing What is SaaS? Conventional vs. SaaS Methodologies Validation Requirements Change Management Q&A

Introduction to Cloud Computing What is SaaS? Conventional vs. SaaS Methodologies Validation Requirements Change Management Q&A Best Practices for Validation of a Software as a Service (SaaS) Customer Relationship Management (CRM) Solution Presented By: Gregg Mauriello Validation Manager Elise Miner Associate Validation Manager

More information

Clinical Trials in the Cloud: A New Paradigm?

Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand

More information

SmartImpact MS Dynamics CRM. Support Service Definition

SmartImpact MS Dynamics CRM. Support Service Definition SmartImpact MS Dynamics CRM Support Service Definition Alliance House, 12 Caxton Road, London, SW1H 0QS United Kingdom Phone: +44 (0) 84 5544 2043 E-mail: info@smartimpact.co.uk http://www.smartimpact.co.uk/

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service

G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service 1 of 19 CONTACT INFORMATION Guy Silver T: 07733 008799 E: guy.silver@dcggroup.com W: www.dcggroup.com Data Continuity Group Limited, Bridge

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,

More information

The Difference Between Disaster Recovery and Business Continuance

The Difference Between Disaster Recovery and Business Continuance The Difference Between Disaster Recovery and Business Continuance In high school geometry we learned that a square is a rectangle, but a rectangle is not a square. The same analogy applies to business

More information

Unlimited Server 24/7/365 Support

Unlimited Server 24/7/365 Support Unlimited Server 24/7/365 Support Unlimited Server Support from System Architects covers your Windows servers, Linux servers and virtual machines. Your servers are monitored and managed 24 hours a day,

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

SaaS Service Level Agreement (SLA)

SaaS Service Level Agreement (SLA) SaaS Service Level Agreement (SLA) The purpose of this document is to define the Service Level Agreement (SLA) for the maintenance and support of the Hosting Service ( Service ). Service Level Agreements

More information

Enterprise level security, the Huddle way.

Enterprise level security, the Huddle way. Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network

More information

Private Cloud Hosting

Private Cloud Hosting Private Cloud Hosting Quick Guide 7/30/2015 2015 EarthLink. Trademarks are property of their respective owners. All rights reserved. 2 Private Cloud Hosting Service Positioning Create Your Own Private

More information

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant Ellucian Cloud Services Joe Street Cloud Services, Sr. Solution Consultant Confidentiality Statement The information contained herein is considered proprietary and highly confidential by Ellucian Managed

More information

This interpretation of the revised Annex

This interpretation of the revised Annex Reprinted from PHARMACEUTICAL ENGINEERING The Official Magazine of ISPE July/August 2011, Vol. 31 No. 4 www.ispe.org Copyright ISPE 2011 The ISPE GAMP Community of Practice (COP) provides its interpretation

More information

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer

More information

Drupal Private Cloud Hosting

Drupal Private Cloud Hosting professional services for the web consultancy design development hosting training support G-Cloud Service Definition Drupal Private Cloud Hosting sales@codeenigma.com T: +44 (0)20 3588 1550 Code Enigma

More information

INTRODUCTION. This book offers a systematic, ten-step approach, from the decision to validate to

INTRODUCTION. This book offers a systematic, ten-step approach, from the decision to validate to INTRODUCTION This book offers a systematic, ten-step approach, from the decision to validate to the assessment of the validation outcome, for validating configurable off-the-shelf (COTS) computer software

More information

CLOUD SERVICES FOR EMS

CLOUD SERVICES FOR EMS CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

Sharon Strause 9/10/2010. 15 years with the

Sharon Strause 9/10/2010. 15 years with the Manage Software Development, Testing, and Validation Presented by Sharon Strause, Senior Consultant EduQuest, Inc. IVT s Computer and Software Validation EU Conference The Hilton Dublin Dublin, Ireland

More information

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

CounselorMax and ORS Managed Hosting RFP 15-NW-0016 CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting

More information

Considerations When Validating Your Analyst Software Per GAMP 5

Considerations When Validating Your Analyst Software Per GAMP 5 WHITE PAPER Analyst Software Validation Service Considerations When Validating Your Analyst Software Per GAMP 5 Blair C. James, Stacy D. Nelson Introduction The purpose of this white paper is to assist

More information

ITSM Governance In the world of cloud computing

ITSM Governance In the world of cloud computing ITSM Governance In the world of cloud computing Housekeeping Welcome to the Webinar Use the control panel to ask questions Can you see & hear us? enter your name & city to confirm Type Your Questions Here

More information

Computerised Systems. Seeing the Wood from the Trees

Computerised Systems. Seeing the Wood from the Trees Computerised Systems Seeing the Wood from the Trees Scope WHAT IS A COMPUTERISED SYSTEM? WHY DO WE NEED VALIDATED SYSTEMS? WHAT NEEDS VALIDATING? HOW DO WE PERFORM CSV? WHO DOES WHAT? IT S VALIDATED -

More information

Managed IT Secure Infrastructure Flexible Offerings Peace of Mind

Managed IT Secure Infrastructure Flexible Offerings Peace of Mind Managed IT Secure Infrastructure Flexible Offerings Peace of Mind Your Place or Ours Why Trust Your Network to SymQuest? SymQuest is an industry leader with a national reputation for service excellence

More information

074-8432-552 Page 1 of 7 Effective Date: 12/18/03 Software Supplier Process Requirements

074-8432-552 Page 1 of 7 Effective Date: 12/18/03 Software Supplier Process Requirements Page 1 of 7 Software Supplier Process Requirements 1.0 QUALITY SYSTEM FRAMEWORK 1.1 QUALITY POLICY The Seller shall document and implement a quality program in the form of Quality manual or detailed Quality

More information

Cloud Hosting. Quick Guide 7/30/15. 2015 EarthLink. Trademarks are property of their respective owners. All rights reserved.

Cloud Hosting. Quick Guide 7/30/15. 2015 EarthLink. Trademarks are property of their respective owners. All rights reserved. Cloud Hosting Quick Guide 7/30/15 2015 EarthLink. Trademarks are property of their respective owners. All rights reserved. 2 Cloud Hosting Service Positioning INCREASE AGIILTY, REDUCE COMPLEXITY & COST

More information

Level I - Public. Technical Portfolio. Revised: July 2015

Level I - Public. Technical Portfolio. Revised: July 2015 Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center

More information

TL 9000 and TS16949 Comparison

TL 9000 and TS16949 Comparison TL 9000 and TS16949 Comparison www.questforum.org Copyright QuEST Forum 2007 1 Purpose This summary is intended to give those familiar with TS16949 requirements a general sense of the additional requirements

More information

Clinical database/ecrf validation: effective processes and procedures

Clinical database/ecrf validation: effective processes and procedures TITOLO SLIDE Testo Slide Testo Slide Testo Slide Clinical database/ecrf validation: effective processes and procedures IV BIAS ANNUAL CONGRESS Padova September, 26 th 2012 PQE WORKSHOP: What's new in Computerized

More information

OECD DRAFT ADVISORY DOCUMENT 16 1 THE APPLICATION OF GLP PRINCIPLES TO COMPUTERISED SYSTEMS FOREWARD

OECD DRAFT ADVISORY DOCUMENT 16 1 THE APPLICATION OF GLP PRINCIPLES TO COMPUTERISED SYSTEMS FOREWARD OECD DRAFT ADVISORY DOCUMENT 16 1 THE APPLICATION OF GLP PRINCIPLES TO COMPUTERISED SYSTEMS FOREWARD 1. The following draft Advisory Document will replace the 1995 OECD GLP Consensus Document number 10

More information

G-Cloud 6 brightsolid Secure Cloud Servers. Service Definition Document

G-Cloud 6 brightsolid Secure Cloud Servers. Service Definition Document G-Cloud 6 brightsolid Service Definition Document December 2014 Contents 1 Introduction... 3 2 An overview of the G-Cloud Service... 3 3 Information assurance... 3 4 Backup and Disaster Recovery... 3 5

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

15 Organisation/ICT/02/01/15 Back- up

15 Organisation/ICT/02/01/15 Back- up 15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

White Paper: Librestream Security Overview

White Paper: Librestream Security Overview White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing

More information

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier

More information

Intel Enhanced Data Security Assessment Form

Intel Enhanced Data Security Assessment Form Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized

More information

How To Get Atos Paas For Free

How To Get Atos Paas For Free G-Cloud Pricing Atos PaaS Accredited Secure+ Contents 1. Introduction... 3 2. Pricing... 4 2.1 Standard Feature Pricing... 4 2.2 Atos PaaS Accredited Secure+ Virtual Machines... 4 2.3 Atos PaaS Accredited

More information

Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014

Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014 Welcome Cloud Computing New Challenges in Data Integrity and Security 13 November 2014 Panel Tracy Lampula, Associate Director of GIS Compliance, Vertex Pharmaceuticals William Sanborn, Director of Information

More information

API Q2 Specification for Quality Management System Requirements for Service Supply Organizations for the Petroleum and Natural Gas Industries

API Q2 Specification for Quality Management System Requirements for Service Supply Organizations for the Petroleum and Natural Gas Industries API Q2 Specification for Quality Management System Requirements for Service Supply Organizations for the Petroleum and Natural Gas Industries A Service Providers Perspective How is API Q2 Different ISO

More information

Cloud Computing in GxP Environment

Cloud Computing in GxP Environment Cloud Computing in GxP Environment Kathy Gniecko Hoffmann LaRoche 3rd April 2014, Stevenage 1 Introductions 18 years Experience in Pharma across all aspects of CSV. Prior to CSV experience in Pharma Research,

More information

ensurcloud Service Level Agreement (SLA)

ensurcloud Service Level Agreement (SLA) ensurcloud Service Level Agreement (SLA) Table of Contents ensurcloud Service Level Agreement 1. Overview... 3 1.1. Definitions and abbreviations... 3 2. Duties and Responsibilities... 5 2.1. Scope and

More information

Information Technology General Controls (ITGCs) 101

Information Technology General Controls (ITGCs) 101 Information Technology General Controls (ITGCs) 101 Presented by Sugako Amasaki (Principal Auditor) University of California, San Francisco December 3, 2015 Internal Audit Webinar Series Webinar Agenda

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005

Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005 Course Syllabus Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005 About this Course Elements of this syllabus are subject to change. This three-day instructor-led

More information

Managing, Maintaining Data in a Virtual World

Managing, Maintaining Data in a Virtual World Moving, ed.harnish@acronis.com Ed Acronis Harnish, Inc. VP Managing, Maintaining Data in a Virtual World BR The VM, Console DR and & Archiving and Recovery Operating Recovery Strategies System Agenda High

More information

ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213

ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213 ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213 Application Compatibility Many organizations have business critical or internally

More information

Tailored Technologies LLC

Tailored Technologies LLC 685 Third Avenue New York, NY 10017 Tel: (212) 503-6300 Fax: (212) 503-6312 Date: January 9, 2014 To: The Audit File of the Hugh L. Carey Battery Park City Authority From: Tailored Technology Observations

More information

Using SharePoint 2013 for Managing Regulated Content in the Life Sciences. Presented by Paul Fenton President and CEO, Montrium

Using SharePoint 2013 for Managing Regulated Content in the Life Sciences. Presented by Paul Fenton President and CEO, Montrium Using SharePoint 2013 for Managing Regulated Content in the Life Sciences Presented by Paul Fenton President and CEO, Montrium Overview Informative Webinar that aims to provide an overview of how SharePoint

More information

Audience. At Course Completion. Prerequisites. Course Outline. Take This Training

Audience. At Course Completion. Prerequisites. Course Outline. Take This Training Designing a High Availability Messaging Solution using Microsoft Exchange Server 2007 Course 5054A: Two days; Instructor-Led Preliminary Course Syllabus Note: You are viewing a Preliminary Course Syllabus.

More information

A CRO's Dilemma - The CDMS Validation Package that Failed Client Audits 19.OCT.2009 1. Disclaimer

A CRO's Dilemma - The CDMS Validation Package that Failed Client Audits 19.OCT.2009 1. Disclaimer A CRO's Dilemma - The CDMS Validation Package that Failed Client Audits Teri Stokes, Ph.D., Director GXP International Concord, MA - USA Common Sense Computer Validation 19.OCT.2009 1 Disclaimer The views

More information

GAMP5 - a lifecycle management framework for customized bioprocess solutions

GAMP5 - a lifecycle management framework for customized bioprocess solutions GE Healthcare Life Sciences GAMP5 - a lifecycle management framework for customized bioprocess solutions imagination at work GE Healthcare s engineering department, Customized Bioprocess Solutions (CBS),

More information

Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile

Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile Jerry Wertelecky, CPA, Fellow HKIoD & Managing Director INTRODUCTION Jerry Wertelecky Country of Birth: United States Current

More information

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet: Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described

More information

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on

More information

LabChip GX/GXII with LabChip GxP Software

LabChip GX/GXII with LabChip GxP Software Regulatory Compliance LabChip GX/GXII with LabChip GxP Software Supporting Regulatory Compliance Caliper LabChip GX/GXII suite of instruments provides automated electrophoresis to analyze quality, size,

More information

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Topics What is SaaS? How does SaaS differ from managed hosting? Advantages of SaaS

More information

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction

More information

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions Sage Nonprofit Online and Sage Virtual Services Frequently Asked Questions General What is Sage Nonprofit Online? Sage Nonprofit Online provides access to Sage 100 Fund Accounting, Sage Grant Management,

More information

Basic knowledge of the Microsoft Windows operating system and its core functionality Working knowledge of Transact-SQL and relational databases

Basic knowledge of the Microsoft Windows operating system and its core functionality Working knowledge of Transact-SQL and relational databases M20462 Administering Microsoft SQL Server Databases Description: This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2014 database. The

More information

The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies

The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies By Rob Sims, Director, Life Science, UL EduNeering When a Life Science

More information

MCSE 5053/5054 - Designing a Messaging Infrastructure and High Availability Messaging Solution Using Microsoft Exchange Server 2007

MCSE 5053/5054 - Designing a Messaging Infrastructure and High Availability Messaging Solution Using Microsoft Exchange Server 2007 MCSE 5053/5054 - Designing a Messaging Infrastructure and High Availability Messaging Solution Using Microsoft Exchange Server 2007 Duration: 5 Days Course Price: $2,975 Software Assurance Eligible Course

More information

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

M6422A Implementing and Managing Windows Server 2008 Hyper-V

M6422A Implementing and Managing Windows Server 2008 Hyper-V M6422A Implementing and Managing Windows Server 2008 Hyper-V Looking at Training Differently... Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: Published: Language(s): Audience(s):

More information

Considerations for validating SDS Software v2.x Enterprise Edition for the 7900HT Fast Real-Time PCR System per the GAMP 5 guide

Considerations for validating SDS Software v2.x Enterprise Edition for the 7900HT Fast Real-Time PCR System per the GAMP 5 guide WHITE PAPER SDS Software v2.x Enterprise Edition Considerations for validating SDS Software v2.x Enterprise Edition for the 7900HT Fast Real-Time PCR System per the GAMP 5 guide This white paper describes

More information

Qualification Guideline

Qualification Guideline Qualification Guideline June 2013 Disclaimer: This document is meant as a reference to Life Science companies in regards to the Microsoft O365 platform. Montrium does not warrant that the use of the recommendations

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

Troux Hosting Options

Troux Hosting Options Troux Hosting Options Introducing Troux Hosting Options Benefits of a Hosted Troux Environment...3 Convenience...3 Time-to-Value...3 Reduced Cost of Ownership...3 Scalability and Flexibility...3 Security...4

More information

Cloud Computing and SaaS Environments

Cloud Computing and SaaS Environments Regulatory Considerations for Use of Cloud Computing and SaaS Environments Institute of Validation Technology Conference Qualifying and Validating Cloud and Virtualized IT Infrastructure Philadelphia PA

More information

Paragon Protect & Restore

Paragon Protect & Restore Paragon Protect & Restore VMware vsphere Free The Most Powerful Free Solution for Backup, Replication and Restore of Virtual Machines in VMware vsphere Environments Backup of on-/offline VMware Guest Systems,

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

Birst Security and Reliability

Birst Security and Reliability Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their

More information

Planning and Administering Windows Server 2008 Servers 70-646

Planning and Administering Windows Server 2008 Servers 70-646 Hands-On Planning and Administering Windows Server 2008 Servers 70-646 Course Description This Hands-On course provides students with the knowledge and skills to implement, monitor, and maintain Windows

More information

Cloud Security and Managing Use Risks

Cloud Security and Managing Use Risks Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access

More information

David.Balka@chi.frb.org 2009 STREAM FRBC

David.Balka@chi.frb.org 2009 STREAM FRBC Virtualization ti Dave Balka David.Balka@chi.frb.org Examination Elements Architecture Management Processes Integrity Availability Security 2 Datacenter Consolidation 3 What is Virtualization A framework

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

Auditing Software as a Service (SaaS): Balancing Security with Performance

Auditing Software as a Service (SaaS): Balancing Security with Performance Auditing Software as a Service (SaaS): Balancing Security with Performance Goals for Today Defining SaaS (Software as a Service) and its importance Identify your company's process for managing SaaS solutions

More information

Computer Visions Course Outline

Computer Visions Course Outline www.compvisions.com 16 Corporate Woods Blvd. Albany, NY 12211 Computer Visions Course Outline Get What You Want We offer highly customizable group training courses: desktop applications, web development,

More information

Computer System Configuration Management and Change Control

Computer System Configuration Management and Change Control Computer System Configuration Management and Change Control What Your IT Department Is Really Doing Justin J. Fisher, Pfizer IT Quality and Compliance Manager Agenda 1. Background 2. Audience Demographics

More information

Ancero Backup & Disaster Recovery (BDR) Service Guide

Ancero Backup & Disaster Recovery (BDR) Service Guide Ancero Backup & Disaster Recovery (BDR) Service Guide Contents Service Overview... 3 Ancero Backup and Disaster Recovery... 3 Hardware Warranty... 3 Warranty Exclusions and Limitations... 3 Extended Hardware

More information

Training Course Computerized System Validation in the Pharmaceutical Industry Istanbul, 16-17 January 2003. Change Control

Training Course Computerized System Validation in the Pharmaceutical Industry Istanbul, 16-17 January 2003. Change Control Training Course Computerized System Validation in the Pharmaceutical Industry Istanbul, 16-17 January 2003 Change Control Wolfgang Schumacher Roche Pharmaceuticals, Basel Agenda Change Control Definitions

More information

Learning Management System Evaluation Guide

Learning Management System Evaluation Guide Learning Management System Evaluation Guide With more than 400 companies with sites in 30 countries, and over 35 million training assignments completed, UL EduNeering is in a unique position to share best

More information

Validated SaaS LMS SuccessFactors Viability

Validated SaaS LMS SuccessFactors Viability Validated SaaS LMS SuccessFactors Viability Executive Summary SuccessFactors has a long history of working with validated organizations and has brought this expertise to their validated SaaS LMS package.

More information

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several

More information